General
-
Target
ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306
-
Size
688KB
-
Sample
241104-q3y24s1dkj
-
MD5
c71d53abd70de0de40b88fb3a4814a8e
-
SHA1
a743d73250d6791a3cc70ec16ac7d8835fa130d6
-
SHA256
ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306
-
SHA512
b3278cceca090a1065ed25b0f36070b713c70477c80492938bd79d7a799dca2abe65d29f52145b64ca375634a08875ba890cb9dfcca36fac4de6ba8d1c4de390
-
SSDEEP
12288:MMrFy90xDEx89UlnlIcPILIjPVmXcOJmA/7L43x0YMBKbLxB8lf+IYYl:5y9eOnKcPRmXccv4hLMgXxqNl
Static task
static1
Behavioral task
behavioral1
Sample
ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Targets
-
-
Target
ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306
-
Size
688KB
-
MD5
c71d53abd70de0de40b88fb3a4814a8e
-
SHA1
a743d73250d6791a3cc70ec16ac7d8835fa130d6
-
SHA256
ae029f27440b439695b77423196d9f23ddf03bd5dbfc3753755c898f850c6306
-
SHA512
b3278cceca090a1065ed25b0f36070b713c70477c80492938bd79d7a799dca2abe65d29f52145b64ca375634a08875ba890cb9dfcca36fac4de6ba8d1c4de390
-
SSDEEP
12288:MMrFy90xDEx89UlnlIcPILIjPVmXcOJmA/7L43x0YMBKbLxB8lf+IYYl:5y9eOnKcPRmXccv4hLMgXxqNl
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1